Preface: I realize the following is asking for tinfoil-hat type security, but I'm really curious for answers to my questions -- not suggestions to enable two-factor logons on gmail, etc. and call it a ...

I am using OpenVPN to secure access to apps running on a CentOS 7 server. Each authorized client has a key which is used to connect to the server using OpenVPN. The problem is that the keys are just ...

A Linux installation can be simply hacked by using a live USB/CD, gaining root access on the live distro, chrooting to the target filesystem and running passwd root. One can use grub too. There may be ...

Actually i'm aware of a "PHP Web Folder". There seems to be some potentials of incoming attacks. So that i want to make sure this whole directory is READ-ONLY (Only writable by ROOT).
Let's say the ...

This is part of a larger effort to try and ensure my server is not infected and spamming the internet with spam emails
I had a friend take a look at the server and he said
"Your procmail is open to ...

I recently had to work with some servers that have an IPv6 connection and I was surprised to find out that fail2ban does not have IPv6 support, neither does denyhosts.
Searching on google I found that ...

I've searched high and low for information on whether eCryptFS encryption is FIPS 140-2 compliant. I've found information on other filesystem or block encryption and their FIPS compliance I presume ...

Suppose you plugged an untrusted usb-stick into your linux machine (as user) and browsed and copied some files, perhaps using a graphical interface.
After the usb-stick is removed (and not available ...

How can I hide a password in shell scripts? There are a number of scripts that are accessing database. If we open the script others also aware the username and password. So if anyone knows how to hide ...

I have been using linux for years, but I need some clarification on what are probably pretty basic principles to how the OS works, but I definitely need clarification due to security concerns.
I am ...

I'm testing some vulnerabilities on a machine which has the port 22333 opened (it's used as the ssh port, and I can connect to it without any problem and I can get connected as well with the telnet ...

I've developed an application that uses NTP to change the network time, to sync two of my computers.
It runs as root, since only the latter is allowed to change the time and date on Linux(I guess).
...

On the local server, I have a program that stores the password in the predefined environment variable (SPECIAL_PASSWORD).
On the remote server I have a program that reads and uses a password from a ...

I've got a raspberry pi set up to send me periodic emails. As it's connected to the internet 24/7, I need IPTables set up properly.
I want to allow incoming SSH and allow emails to send out on port ...